If you need to download something for a class, first

Answers

Answer 1

Answer:

left click, then click save image

Explanation:

Answer 2

Answer:

first try to do it on kami, then on Google docs, then on doc-hub


Related Questions

Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while loop. If the user types 'end', the program exits, otherwise it keeps going.

Answers

Answer:

Written in Python:

def myfunction():

     userinput = input("User input: ")

     while(userinput != "end"):

           countdown(userinput)

           userinput = input("User input: ")

Explanation:

This line defines the function

def myfunction():

           This line prompts user for user input

           userinput = input("User input: ")

           The following while loop checks if userinput is not "end". It continues execution until user input "end"

           while(userinput != "end"):

                       countdown(userinput) If yes, the input is passed to the countdown function for execution

                       This line prompts user for another user input

                       userinput = input("User input: ")

Please note the above code segment assumes that countdown() function has already been written and defined

Write a script that inputs a line of plaintext and a distance value and outputs an encrypted text using a Caesar cipher.
The script should work for any printable characters. An example of the program input and output is shown below:
Enter a message: Hello world!
Enter the distance value: 4
Output: Lipps${svph%

Answers

Answer:

def encrypt_text(text,value):

   encoded = ""

   for i in range(len(text)):

       char = text[i]

       if (char.isupper()):

           encoded += chr"po"ord'po'char'pc' + value -65'pc' % 26 + 65'pc'

       else:

           encoded += chr'po'ord'po'char'pc' + value -97'pc' % 26 + 97'pc'

   return encoded

plaintext = input("Enter sentence of encrypt: ")

dist_value = int(input("Enter number: "))

encrypted = encrypt_text(plaintext, dist_value)

print(encrypted)

Explanation:

The python program above is a Ceasar cipher implementation. The encrypt_text function is defined to accept text input and a distance value, which is used to encrypt the plaintext.

The user can directly input text and the distance value from the prompt and get the encrypted text printed on the screen.

Create a new program with a struct, Data, that contains: an int a char[80] Write a function newData(char[]), that takes char[] as a parameter

Answers

Answer:

#include <iostream>

#include <cstring>

using namespace std;

struct Data {

   int userId;

   char name[80];

}

void newData(string data char[]){

   int counts= 0;

   struct Data name;

   data.userId = ++counts;

   data.name = char[];

   cout<< data.userId << "\n"<< data.name ;

}

int main( ) {

   char myName;

   string mydata;

   cin>> myName;

   cin>> mydata;

   newData( myName, mydata);

}

Explanation:

The c++ source code above stores its data in a struct called "Data". The function newData dynamically creates new data from the struct defined.

Input an int greater than 0 and print every multiple of 5 between it and 0 inclusive in descending order. If the number is not greater than 0 print "error". Print all numbers on one line with single spaces in between.
Example:
Enter a positive integer:
42
40 35 30 25 20 15 10 5 0

Answers

import java.util.Scanner;

public class JavaApplication42 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter a positive integer:");

       int num = scan.nextInt();

       if (num < 0){

           System.out.println("error");

       }

       else{

           while(num >=0){

               if (num %5 == 0){

                   System.out.print(num+" ");

               }

               num--;

           }

       }

   }

I hope this helps!

The program is an illustration of loops.

Loops are used to carry out repetition operations;

The program in Python, where comments are used to explain each line is as follows:

#This gets a positive integer from the user

num = int(input("Enter a positive integer: "))

#If the input is not greater than 0

if num <= 0:

   #This prints Error

   print("Error")

#If otherwise

else:

   #This iteration is repeated until 0 is printed

   while num>=0:

       #If the current number is a multiple of 5

       if num%5 == 0:

           #The number is printed

           print(num,end=" ")

       #This decreases the number by 1, until it gets to 0

       num-=1

The above program is implemented using a while loop

Read more about similar programs at:

https://brainly.com/question/20349503

Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.

Answers

Answer:

Down below

Explanation:

Color Mode  - He must print in CMYK because  that color mode retains all the colors.

Document Size  - He must keep the font size at  12 points to maintain proper readability.

Texture  - He must use paper that’s glossy  on one side and uncoated on

the other to produce fine-quality prints.

Printing Stock  - He must avoid printing on colored  stock to avoid distortion of the ink color.

 

Colour Mode—He must print in CMYK because  that colour mode retains all the colours. Document Size—He must keep the font size at  12 points to maintain proper readability. Texture—He must use paper that’s glossy  on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.

What is Texture?

Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.

In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.

Thus, the statement are matched above.

For more details about textured, click here:

https://brainly.com/question/14989874

#SPJ5

Which statistical measurement tools should be
used to solve the problem? Check all of the boxes
that apply.
A coach wants to calculate the average test scores
of students who participate in the most popular
sport that the school offers.
mean
median
mode

Answers

Answer:

mean

mode

Explanation:

edg 2020

Answer:

MEAN

mode

Explanation:

Which term describes a visual object such as a picture a table or text box

Answers

the correct answer is “caption”

Answer: caption

Explanation:

Edge 2020

Write a multi-way if statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variables neutral, base, and acid:

Answers

Answer:

try:

   pH = float(input("Enter number between 0 to 14: "))

except ValueError:

   print("input must be a number")

if pH < 7:

   print("pH is Acidity")

elif pH == 7:

   print("pH is neutral")

else:

   print("pH is Base/alkaline")(

Explanation:

The try and except statement is used to check if the input is a number, if its not, the print statement is displayed. The nested if statement compares the pH input to know if it is an acid, base or neutral.

Help me! I’ll mark you brainly ! Please help me I need this now

Answers

Explanation: For number 3 I would say shade and darkness.

Shrink-wrap, box-top, and click-wrap agreements are inherent to e-commerce. How you feel about them often depends on whether you are the vendor or purchaser. What are the best practices to assure shrink-wrap, box-top, and click-wrap agreements are legal? What are the best ethical practices that the e-commerce industry should adopt?

Answers

Answer:

Shrink-wrap, Box-top, and Click-wrap Agreements

a) The best practices to assure that shrink-wrap, box-top, and click-wrap agreements are legal include  

1) having e-commerce terms and conditions separate from the normal trade terms and conditions,  

2) ensuring that customers agree to the terms before entering into a transaction, and  

3) laying the code of conduct for all visitors interacting with your site or doing any business transaction on your site.

b) The best ethical practices that the e-commerce industry should adopt are:

1) Put additional layers of protection like a web application firewall to their websites.  

2) Ensure they always adhere to PCI (Payment Card Industry) compliance guidelines.

3) They should not store customers' data which they do not need.

4) Ensure privacy and security of customers' data.

5) Establish trust by safeguarding intellectual property rights.

6) Consider some environmental issues (customers care about them).

Explanation:

a) Websites' Terms and Conditions (T&C) establish some form of legal contract between the organization and its clients.  

b)To ensure that organizations that process, store, or transmit credit card information maintain secure online environment, they are required to comply with PCI DSS.  It is a set of Payment Card Industry requirements for all organizations involved in the use of online cards for payment for their goods and services.

Who wants to play nitro type with me. My user is thievesGuildcuu

Answers

Answer:

I can

Explanation:

Answer:

Sure.

My user Name is: Queen Void.

Write a logical expression using only and, or and not that is equivalent to the Exclusive NOR (XNOR) gate on 2 inputs, called in1, in2: If both inputs are True or both inputs are False (i.e. inputs have same value), then your expression should evaluate to True. Otherwise your expression should evaluate to False.

Answers

Answer:

in1 = int(input("Enter value one: "))

in2 = int(input("Enter value two: "))

print(in1,type(in1), in2, type(in2))

if (in1 <=0 and in2 <=0) or (not in1 <=0 and not in2<=0):

   print( True)

else:

   print( False)

Explanation:

The if statement of the python source code is used to implement an Exclusive-NOR logic gate that gives a true or high value if both inputs are either true or false.

a rectangle is 12 cm long and 9 cm wide.Its perimeter is doubled when each of its sides is increased by a fixed length.what is the length?​

Answers

Answer:

length = 12 cm

breadth = 9 cm.

perimeter of rectangle = 2( l+b)

= 2(12+9) = 2(21) = 42cm.

New length = (12+x) cm

New breath = (9+x) cm

2(12+x+9+x) = 42×2

2(21+x) = 84

21+ x = 84/2

21+x = 42

x= 42-21= 21

x= 21.

Therefore, length = (12+x)cm

=( 12+21) cm = 33cm.

Explanation:

Firstly we have written the length and breadth of the rectangle.

And the perimeter of rectangle i.e. 2(l+b)

Then, as it is in question we have doubled the perimeter

And at last, we have got the value of x.

and by putting the value in the new length we will get our answer.

hope you have got your answer dear.

Lab9A: Warmup. Write a program that contains three methods: Method max (int x, int y, int z) returns the maximum value of three integer values. Method min (int X, int y, int z) returns the minimum value of three integer values. Method average (int x, int y, int z) returns the average of three integer values. Note: for Java and C#, these methods must be public and static. Prompt the user for three numbers, then call these methods from main to print out the minimum, maximum and average of numbers that the user entered. Your program should behave like the sample output below. Sample output #1 Enter number 1: 5 Enter number 2: 9 Enter number 3: 2 Min is 2 Max is 9 Average is 5.33333 Sample output 2 Enter number : 45 Enter number 2 : 11 Enter number 3: -3 Min is-3 Max is 45 Average is 17.6667

Answers

import java.util.Scanner;

import java.util.Arrays;

public class JavaApplication30 {

   public static int max(int x, int y, int z){

       int[] arr = {x, y, z};

       Arrays.sort(arr);

       return arr[2];

   }

   public static int min(int x, int y, int z){

       int[] arr = {x, y, z};

       Arrays.sort(arr);

       return arr[0];

   }

   public static double average(int x, int y, int z){

       return  (double) (x + y + z) / 3;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter your first number");

       int x = scan.nextInt();

       System.out.println("Enter your second number");

       int y = scan.nextInt();

       System.out.println("Enter your third number");

       int z = scan.nextInt();

       

       System.out.println("Min is "+min(x,y,z));

       System.out.println("Max is "+max(x,y,z));

       System.out.println("Average is "+average(x,y,z));

   }

   

}

I hope this helps! If you have any more questions, I'll try my best to answer them.

20 pts, please write in JAVA. need this ASAP
In the Lesson Slides for this activity, we developed a method findChar for figuring out if a character was in a String.

The implementation was:

public boolean findChar(String string, String key)
{
for(int index = 0; index < string.length(); index++)
{
String character = string.substring(index,index+1);
if(character.equals(key))
{
return true;
}
}
return false;
}
However, there is a much more efficient and simple algorithm that we can use to determine if a character is in a String. Using the method signature public boolean findChar(String string, String key), figure out a more efficient method with a lower exection count.

Hint: We’ve learned a couple of methods that can tell us what index a character is at - can we use those to determine if the character is in a String?

Answers

public class JavaApplication78 {

   public boolean findChar(String string, String key){

       if (string.contains(key)){

           return true;

       }

      return false;

   }

   public static void main(String[] args) {

       JavaApplication78 java = new JavaApplication78();

       System.out.println(java.findChar("hello", "h"));

   }

   

}

First I created the findChar method using the contains method. It checks to see if a certain sequence of characters is in another string. We returned the result. In our main method, we had to create a new instance of our main class so we could call our findChar method.

Which input value causes the loop body to execute a 2nd time, thus outputting "In loop" again? { String s = "Go"; while ((!s.equals("q"))&& (!s.equals("")) System.out.println("In loop"); 5 - scnr.nextO;
a) "Quit"
b) "q" only
c) "Q only
d) Either "q" or "Q"

Answers

Answer:

a) "Quit"  

c) "Q only

Explanation:

Given

String s = "Go";

while ((!s.equals("q"))&& (!s.equals("")))  {

System.out.println("In loop");

s = scnr.next();

}

Required

What input causes another execution

Analyzing the while condition

while ((!s.equals("q"))&& (!s.equals("")))  

This can be split into:

!s.equals("q")) && (!s.equals(""))

Meaning

When s is not equal to "q" and when s is not an empty string

In other words,

the loop will be executed when user input is not "q" and user input is not empty.

So, from the list of given options: The loop both will be executed when:

a) Input is "Quit"

c) Input is Q only

Input of q will terminate the loop, hence b and d are incorrect

how has the Internet of Things affected business​

Answers

Internet of Things devices can be connected to each other and controlled to improve efficiency,which in turn has direct effects on the productivity of the business. Hope this helps!

Answer:

Business equipment can be continually adjusted based on analysis of data

Explanation:

A P E X

Assume that we need to transmit a 1,440 X
900 uncompressed color image (using 16 bits
per pixel) over a computer network in less than
0.01 second. What is the minimal necessary
line speed to meet this goal?

Answers

Answer:

The answer is "[tex]247.19 \ \frac{MB}{sec}[/tex]".

Explanation:

over all pixels [tex]= 1,440 \times 900[/tex]

                       [tex]= 1,296,000\\\\= 1,296 \times 10^3[/tex]

[tex]time = 0.01 \ sec \\[/tex]

formula of time:

[tex]time= \frac{bits}{speed} \\\\speed= \frac{bits}{time}[/tex]

         [tex]=\frac{1,296 \times 10^3 \times 16}{0.01}\\\\=20,736 \times 10^5 \ \frac{bytes}{second}\\\\=\frac{20,736 \times 10^5}{8} \ \frac{bytes}{second}\\\\= 2,592 \times 10^5 \ \frac{bytes}{second}\\\\= 247.19 \ \frac{MB}{sec}[/tex]

There is no danger of data collision with this topology.

bus
mesh
ring
star

Answers

Answer:

ring

Explanation:

The Answer


C.Ring

This is evident beacause I am your advisor and I made that test so

We study computer____to become familiar with how circuits and signals collaborate to create working computer systems.
A) architecture
B) organization
C) layers
D) systems of linear equations

Answers

Answer:

Option B (Organization) would be the correct answer.

Explanation:

It communicates about either the simple interface provided to either the compiler as well as the OS by the digital hardware to accommodate customers' requirements. Computer company struggles through computer program hardware components, including input machines, processing elements (CPU), storage, as well as main memory systems.

The other options offered aren't relevant to the scenario presented. So, the solution here is just the right one.

X333: countElements Given an array of integers and an integer target, return a count of the number of times the target value occurs in the array. Examples: countElements((25, 42, 18, 25, 38, 96, 25, 25〉, 25) -> 4 countElements (110, 20, 30, 40, 50, 99)-> θ 1 public int countElements (int[] nums, int target) 2 {34 }5

Answers

Answer:

The method written in java is as follows:

public static int countElements(int[] nums, int target){

    int count=0;

    for(int i =0;i<nums.length;i++){

        if(nums[i] == target){

            count++;

        }

    }

    return count;

}

Explanation:

The method definition is not clear in the question you posted; so, I'll answer the question from scratch

This defines the method

public static int countElements(int[] nums, int target){

This initializes count to 0

    int count=0;

This iterates through the array

    for(int i =0;i<nums.length;i++){

This checks if the current array element is same as the target

        if(nums[i] == target){

If yes, the count variable is incremented by 1

            count++;

        }

    }

This returns the count

    return count;

}

See attachment for complete program which includes the main

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot.

Sample output with inputs: 5 8

Answers

I wrote my code in python 3.8:

def print_total_inches(num_feet, num_inches):

   return ((num_feet)*12) + num_inches

print("There are a total of {} inches".format(print_total_inches(5,8)))

I hope this helps!

An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed in the Ethernet frame, and if so, how many bytes?

Answers

Answer:

No padding

Explanation:

64 bytes is taken as the minimum Ethernet frame, this encompass checksum as well as addresses in the Ethernet frame header and length field. while the maximum Ethernet frame is 1518 bytes, any minimumEthernet frame that is short compare to that will need receiving stations to interpret it as a collision. The question specified that the IP packet to be transmitted by Ethernet as 60 bytes long. The header fields here can occupy 18 bytes, Then total frame size becomes 78 bytes. With the total frame size of 78 bytes(60 bytes+ 18 bytes) we can see it has exceeded the 64-byte minimum. Hence there is no padding used.

Why would an information systems security practitioner want to see network traffic on both internal and external network traffic?

Answers

Answer:

To see who is accessing data and also where it is going

Explanation:

An information systems practitioner is a person who is involved in the planning and and also implementation of IT resources for any organization which he at she works.

The information systems practitioner would want to want to see network traffic on both internal and external network traffic so as to know who is accessing data and to also know where it is going.

Which of the following situations is least likely fair use

Answers

Answer:

Is there more to the question or is that it?


Where are the situations??

The ball in the program was an instance of a sphere.

Which quantity do you change to move the ball?

vector

pos

radius

axis

Answers

Answer:

axis

Explanation:

i hop is correct don geve my 5 start in to is conform

Answer:

Pos

Explanation:

Edge2020

Using complete sentences post a detailed response to the following.

What are the advantages and disadvantages of top-down and bottom-up programming? How would you decide which one to use? Do you approach problems in your real life from a bottom-up or top-down approach?

Answers

Answer:

some advantages of top down is that you can start off from what you know and figure out what you need to complete it, advantages to bottom up is that you can make something new . if you are starting something from scratch and you dont know what the end goal might be you would use bottom up but if you already have an idea or the final product of what you want you would go the top down approach.

Explanation: just saying you shouldnt just copy and paste my response but rather pick out what you want to say and use this to complete what ever your working on. hope i helped :)

Answer:

the guy on top of me is super right follow him

Explanation:

What is payload?
a block of data inside the packet
a block of data transmitted across a network
the maximum amount of data a network can transmit
a 32-bit numeric address

Answers

Answer:

a block of data inside the packet

This is my paragraph

. The type of color is ude in this code line is ..............................

Answers

What is the paragraph even supposed to be about

Someone help me for about how to avoid online scams please I need help no trolls

Answers

Answer:

1. (for emails) Block spam messages.

2. Look at who sent whatever it is and make sure it is the exact email for the brand.

3. If someone is putting a lot of emojis in a comment or somthing its fake.

4. Make sure to read the fine print.

5. Do not giveaway personal information like zip code, address, social security number.

Other Questions
Why was the Cherokee writing system important? Detyra 3: Takim me furnitorinRovena shkon me makin nga restorantite furnitori i perimeve, 9 km larg. Secili ngashokt mban shnim t gjitha udhetimet qebhen n lidhje me restorantin dhe kohene shpenzuar n takime ne menyre qeshpenzimet t'u rimbursohen dhe te dine sakohe po investojnea Vizatoni nj grafik t largess n varsi tekohs pr udhtimin e Rovenesb Ne cilen or kthehet ajo ne restorantc Pr sa koh nuk ishte ajo ne restorantArtesohun50 what is an outcome variable in an experiment?Subject; science experiment Define and give examples of greenhouse gases Can some answers this please! What were the beliefs of the Federalists led by Alexander Hamilton? Select all that apply.MultAThe Constitution gave government implied powers. bThere should be no national bank to issue and borrow money. cElected representatives should rule in the peoples name. dEducated, wealthier men should hold public office. A satellite was in two separate crashes. In both crashes, the satellite had the same mass. Engineers want to know about the speed and direction of the satellite after the crashes. Why would the crash affect the motion of the satellite, and which crash caused a greater change in motion for the satellite? HELP! HELP!an element with 5 protons, and 8 electrons has an atomic number of? Read the excerpt from Through the Looking Glass, by Lewis Carroll."How would you like to live in Looking-glass House, Kitty? I wonder if they'd give you milk in there? Perhaps Looking-glass milk isn't good to drinkBut oh, Kitty! now we come to the passage. You can just see a little PEEP of the passage in Looking-glass House, if you leave the door of our drawing-room wide open: and it's very like our passage as far as you can see, only you know it may be quite different on beyond. Oh, Kitty! how nice it would be if we could only get through into Looking-glass House! I'm sure it's got, oh! such beautiful things in it! Let's pretend there's a way of getting through into it, somehow, Kitty. Let's pretend the glass has got all soft like gauze, so that we can get through.Based on details in the text, which statement is the best prediction of Alices behavior?Alice will climb through the looking glass to have a look at the other room.Alice will stop to wonder about the other room and play somewhere else.Alice will eventually get bored with the other room in the looking glass.Alice will break the looking glass so she no longer has to look at the room. Book: Call of the WildBuck's hardships are the result of A. Manuel's gambling habits B. a plot set by other dogs C. his weakness D. his inability to serve E. astrological conditions how have rogers feelings changed since the beginning of the story from thank you m'am someone please help Trinitrotoluene (TNT, C7H5N3O6) undergoes complete combustion according to the following balanced chemical equation:C7H5N3O6(s)+214O2(g)7CO2(g)+32N2(g)+52H2O(l)If 25.7 g of TNT is combusted in a 0.500 L container filled with O2 at a pressure of 7.02 bar and a temperature of 298 K, calculate the maximum mass of CO2 that could be produced. Which air is driest?Air Temp 66F Dew-point 60FAir Temp 77F Dew-point 19FAir Temp 50F Dew-point 36FAir Temp 30F Dew-point 29F plsssssssssssssssssssssssssssssssssssssssss help me In paragraph 18, why does the author follow the line, People did right then, with, Oh look at the cute little pickaninny!? Select the budget that would most quickly achieve the financial goal of saving $6000 for college tuition. Which Spanish conqueror is not accurately matched with the area he explored or conquered?Ponce de Len - FloridaHernando Corts - MesoamericaHernando de Soto - southeastern United StatesFrancisco Vasquez de Coronado - western South America Which term describes a visual object such as a picture a table or text box Our family nearly has a "family night" every month. Mom and Dad think it's just important to get together and have some fun. The kids endure it merely. On nights when everyone picks a game, we have time scarcely to play them all. Sometimes we play a board game, but more often we play just cards or dominoes. Even we have played video games to please all family members. We sometimes rent a movie, but hardly agreeing on which one is a simple task. Whatever the activity, though, we always have popcorn. Being away at college now, family night is missed, which surprises me. Moaning and groaning the loudest, college meant no more dippy family nights. So now, on family nights, I make myself just a bowl of popcorn and call home.